Cryptography Reference
In-Depth Information
FIGURE 16.20
The four pixels of each cover block CBi.
Step 4:
To prevent illicit attempts, a simple authentication ability is
added here. Compute check bits pi by using Equation 16.17 and
embed pi into the remaining LSBs of Ci,
i
, D
i
, G
i
, H
i
from the
same cover block CBi,
i
, where i = 1, 2, ..., t. Note that t is the
total number of check bits, which is discretionary and could be
decided by the sender according to authentication strength. For
simplicity, we take t = 2 as an example to explain the procedure
as shown in
Figure 16.22.
Figure 16.23
illustrates a flowchart of
FIGURE 16.21
Hiding the six data bits of F(Xi).
Search WWH ::
Custom Search